Skip to main content

Encryption

Attacking a weak crypto system

posted onFebruary 4, 2009
by hitbsecnews

Our previous experience with hardware encryption has shown that budget is equivalent to almost useless. Unfortunately, Raidon's Staray S series is no exception and the various models in the series offer no real protection from serious attacks. This article explains how we conducted our analysis.

Cryptol, the language of cryptography, now available

posted onDecember 29, 2008
by hitbsecnews

Galois is pleased to announce that Cryptol, the language of cryptography, is now available to the public!

Cryptol is a domain specific language for the design, implementation and verification of cryptographic algorithms, developed over the past decade by Galois for the United States National Security Agency. It has been used successfully in a number of projects, and is also in use at Rockwell Collins, Inc.

NIST Announces Round 1 Candidates For SHA-3 Competition

posted onDecember 22, 2008
by hitbsecnews

NIST has announced the round 1 candidates for the Cryptographic Hash Algorithm Challenge. Of the 64 who submitted entries, 51 were accepted. Of those, in mere days, one has been definitely broken, and three others are believed to have been.

Quantum encryption broken with time travel?

posted onDecember 10, 2008
by hitbsecnews

The field of quantum mechanics allows security codes to be sent completely free of being detected and read. However, U.S. scientists say they could break these quantum encryption codes with time travel, specifically, wormholes. That is, if wormholes exist?

Nation's first encryption law

posted onNovember 10, 2008
by hitbsecnews

For the first time in the United States, a law specifies that encryption be used for the transmission of any electronic data. Nevada's NRS 597.970, which went into effect on Oct. 1, states: “A business in this State shall not transfer any personal information of a customer through an electronic transmission other than a facsimile to a person outside of the secure system of the business unless the business uses encryption to ensure the security of electronic transmission.”

15-year old vies to build new crypto standard

posted onNovember 8, 2008
by hitbsecnews

Fifteen-year-old Peter Schmidt-Nielsen spent only a month working on his submission, but he thinks he's come up with something "unusual and new." Never mind that he's up against some of the most famous cryptographers in the world.

Schmidt-Nielsen is one of more than 60 entrants in what's expected to be a four-year contest to pick a new hashing algorithm that will help lock down the cryptography used by everything from Web-based payment systems to secure e-mail to source-code management tools.

Schneier says quantum cryptography is “nearly useless”

posted onOctober 17, 2008
by hitbsecnews

Deployment of networks protected by quantum cryptography is “nearly useless” for practical uses according to security expert Bruce Schneier.

The world’s first network using quantum cryptography went live last week in Austria but Schneier, in an article for Wired, said the deployment changes little in the security field.

Laser cracks 'unbreakable' quantum communications

posted onOctober 4, 2008
by hitbsecnews

Quantum cryptography is supposed to be unbreakable. But a flaw in a common type of equipment used makes it possible to intercept messages without detection.

Quantum cryptography has been used by some banks to protect data, and even to hide election results in Switzerland last year. But it has been discovered that shining bright light into the sensitive equipment needed makes it possible to hijack communications without a trace.

Data breach at Virgin prompts encryption order

posted onOctober 1, 2008
by hitbsecnews

Virgin Media has been ordered to encrypt all portable media that is used to move data after it lost the details of 3,000 would-be customers.

According to the Information Commissioner's Office, the individuals' data went missing after an unencrypted CD was lost by Virgin Media.